FedRAMP Rev 5 Moderate Baseline 2023-08-31T00:00:00Z 2024-01-11T23:40:17Z 5.1.1+fedramp-20240111-0 1.1.1 Document creator The FedRAMP Program Management Office (PMO) PMO The FedRAMP Joint Authorization Board (JAB) JAB Federal Risk and Authorization Management Program: Program Management Office FedRAMP PMO info@fedramp.gov
1800 F St. NW Washington DC 20006 US
Federal Risk and Authorization Management Program: Joint Authorization Board FedRAMP JAB 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d ca9ba80e-1342-4bfd-b32a-abac468c24b4
ac-1 ac-2 ac-2.1 ac-2.2 ac-2.3 ac-2.4 ac-2.5 ac-2.7 ac-2.9 ac-2.12 ac-2.13 ac-3 ac-4 ac-4.21 ac-5 ac-6 ac-6.1 ac-6.2 ac-6.5 ac-6.7 ac-6.9 ac-6.10 ac-7 ac-8 ac-11 ac-11.1 ac-12 ac-14 ac-17 ac-17.1 ac-17.2 ac-17.3 ac-17.4 ac-18 ac-18.1 ac-18.3 ac-19 ac-19.5 ac-20 ac-20.1 ac-20.2 ac-21 ac-22 at-1 at-2 at-2.2 at-2.3 at-3 at-4 au-1 au-2 au-3 au-3.1 au-4 au-5 au-6 au-6.1 au-6.3 au-7 au-7.1 au-8 au-9 au-9.4 au-11 au-12 ca-1 ca-2 ca-2.1 ca-2.3 ca-3 ca-5 ca-6 ca-7 ca-7.1 ca-7.4 ca-8 ca-8.1 ca-8.2 ca-9 cm-1 cm-2 cm-2.2 cm-2.3 cm-2.7 cm-3 cm-3.2 cm-3.4 cm-4 cm-4.2 cm-5 cm-5.1 cm-5.5 cm-6 cm-6.1 cm-7 cm-7.1 cm-7.2 cm-7.5 cm-8 cm-8.1 cm-8.3 cm-9 cm-10 cm-11 cm-12 cm-12.1 cp-1 cp-2 cp-2.1 cp-2.3 cp-2.8 cp-3 cp-4 cp-4.1 cp-6 cp-6.1 cp-6.3 cp-7 cp-7.1 cp-7.2 cp-7.3 cp-8 cp-8.1 cp-8.2 cp-9 cp-9.1 cp-9.8 cp-10 cp-10.2 ia-1 ia-2 ia-2.1 ia-2.2 ia-2.5 ia-2.6 ia-2.8 ia-2.12 ia-3 ia-4 ia-4.4 ia-5 ia-5.1 ia-5.2 ia-5.6 ia-5.7 ia-6 ia-7 ia-8 ia-8.1 ia-8.2 ia-8.4 ia-11 ia-12 ia-12.2 ia-12.3 ia-12.5 ir-1 ir-2 ir-3 ir-3.2 ir-4 ir-4.1 ir-5 ir-6 ir-6.1 ir-6.3 ir-7 ir-7.1 ir-8 ir-9 ir-9.2 ir-9.3 ir-9.4 ma-1 ma-2 ma-3 ma-3.1 ma-3.2 ma-3.3 ma-4 ma-5 ma-5.1 ma-6 mp-1 mp-2 mp-3 mp-4 mp-5 mp-6 mp-7 pe-1 pe-2 pe-3 pe-4 pe-5 pe-6 pe-6.1 pe-8 pe-9 pe-10 pe-11 pe-12 pe-13 pe-13.1 pe-13.2 pe-14 pe-15 pe-16 pe-17 pl-1 pl-2 pl-4 pl-4.1 pl-8 pl-10 pl-11 ps-1 ps-2 ps-3 ps-3.3 ps-4 ps-5 ps-6 ps-7 ps-8 ps-9 ra-1 ra-2 ra-3 ra-3.1 ra-5 ra-5.2 ra-5.3 ra-5.5 ra-5.11 ra-7 ra-9 sa-1 sa-2 sa-3 sa-4 sa-4.1 sa-4.2 sa-4.9 sa-4.10 sa-5 sa-8 sa-9 sa-9.1 sa-9.2 sa-9.5 sa-10 sa-11 sa-11.1 sa-11.2 sa-15 sa-15.3 sa-22 sc-1 sc-2 sc-4 sc-5 sc-7 sc-7.3 sc-7.4 sc-7.5 sc-7.7 sc-7.8 sc-7.12 sc-7.18 sc-8 sc-8.1 sc-10 sc-12 sc-13 sc-15 sc-17 sc-18 sc-20 sc-21 sc-22 sc-23 sc-28 sc-28.1 sc-39 sc-45 sc-45.1 si-1 si-2 si-2.2 si-2.3 si-3 si-4 si-4.1 si-4.2 si-4.4 si-4.5 si-4.16 si-4.18 si-4.23 si-5 si-6 si-7 si-7.1 si-7.7 si-8 si-8.2 si-10 si-11 si-12 si-16 sr-1 sr-2 sr-2.1 sr-3 sr-5 sr-6 sr-8 sr-10 sr-11 sr-11.1 sr-11.2 sr-12 true

at least every 3 years

at least annually

significant changes

twenty-four (24) hours

eight (8) hours

eight (8) hours

quarterly for privileged access, annually for non-privileged access

Selection: disables

no more than 96 hours from last use

24 hours for user accounts

ninety (90) days (See additional requirements and guidance.)

for privileged users, it is the end of a user's standard work period

organization-defined need with justification statement that explains why such accounts are necessary

at a minimum, the ISSO and/or similar role within the organization

one (1) hour

all security functions

at a minimum, annually

all users with privileges

see additional Requirements and Guidance

see additional Requirements and Guidance

fifteen (15) minutes

at least quarterly

at least every 3 years

at least annually

significant changes

at least annually

at least annually

at least annually

at least annually

at least one (1) year or 1 year after completion of a specific training program

at least every 3 years

at least annually

significant changes

successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes

organization-defined subset of the auditable events defined in AU-2a to be audited continually for each identified event.

annually and whenever there is a change in the threat environment

session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon; individual identities of group account users; full-text of privileged commands

overwrite oldest record

at least weekly

one second granularity of time measurement

a time period in compliance with M-21-31

all information system and network components where audit capability is deployed/available

at least every 3 years

at least annually

significant changes

at least annually

individuals or roles to include FedRAMP PMO

any FedRAMP Accredited 3PAO

the conditions of the JAB/AO in the FedRAMP Repository

at least annually and on input from JAB/AO

at least monthly

in accordance with OMB A-130 requirements or when a significant change occurs

to include JAB/AO

at least annually

at least annually

at least every 3 years

at least annually

significant changes

at least annually and when a significant change occurs

to include when directed by the JAB

Configuration control board (CCB) or similar (as defined in CM-3)

at least quarterly

at least annually

at least quarterly or when there is a change

at least monthly

automated mechanisms with a maximum five-minute delay in detection

continuously

Continuously (via CM-7 (5))

Federal data and system data that must be protected at the High or Moderate impact levels

at least every 3 years

at least annually

significant changes

at least annually

all

time period defined in service provider and organization SLA

*See Additional Requirements

at least annually

at least annually

at least annually

functional exercises

daily incremental; weekly full

daily incremental; weekly full

daily incremental; weekly full

at least annually

all backup files

at least every 3 years

at least annually

significant changes

local, network and remote

privileged accounts; non-privileged accounts

FIPS-validated or NSA-approved cryptography

privileged accounts; non-privileged accounts

at a minimum, the ISSO (or similar role within the organization)

at least two (2) years

contractors; foreign nationals

at least every 3 years

at least annually

significant changes

ten (10) days for privileged users, thirty (30) days for Incident Response roles

at least annually

at least annually

functional, at least annually

US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

at least annually

see additional FedRAMP Requirements and Guidance

see additional FedRAMP Requirements and Guidance

at least annually

at least every 3 years

at least annually

significant changes

at least annually

the information owner

a timeframe to support advertised uptime and availability

at least every 3 years

at least annually

significant changes

all types of digital and/or non-digital media containing sensitive information

no removable media types

organization-defined security safeguards not applicable

all types of digital and non-digital media with sensitive information

see additional FedRAMP requirements and guidance

all media with sensitive information

prior to leaving secure/controlled environment: for digital media, encryption in compliance with Federal requirements and utilizes FIPS validated or NSA approved cryptography (see SC-13.); for non-digital media, secured in locked container

techniques and procedures IAW NIST SP 800-88 Section 4: Reuse and Disposal of Storage Media and Hardware

at least every 3 years

at least annually

significant changes

at least annually

CSP defined physical access control systems/devices AND guards

in all circumstances within restricted access area where the information system resides

at least annually

at least annually or earlier as required by a security relevant event.

at least monthly

for a minimum of one (1) year

at least monthly

near more than one egress point of the IT area and ensures it is labeled and protected by a cover to prevent accidental shut-off

service provider building maintenance/physical security personnel

service provider emergency responders with incident response responsibilities

consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments

continuously

all information system components

at least every 3 years

at least annually

significant changes

to include chief privacy and ISSO and/or similar role or designees

to include chief privacy and ISSO and/or similar role

at least annually

at least every 3 years

at least annually and when the rules are revised or changed

at least annually and when a significant change occurs

at least every 3 years

at least annually

significant changes

at least every three years

for national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance.

For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions

personnel screening criteria - as required by specific information

four (4) hours

twenty-four (24) hours

including access control personnel responsible for the system

twenty-four (24) hours

at least annually

at least annually and any time there is a change to the user's level of access

including access control personnel responsible for the system and/or facilities, as appropriate

within twenty-four (24) hours

to include the ISSO and/or similar role within the organization

24 hours

at least every 3 years

at least annually

significant changes

security assessment report

at least every three (3) years and when a significant change occurs

at least every three (3) years

monthly operating system/infrastructure; monthly web applications (including APIs) and databases

high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery

within 24 hours prior to running scans

all components that support authentication

all scans

at least every 3 years

at least annually

significant changes

at a minimum to include security-relevant external system interfaces; high-level design; low-level design; source code or network and data flow diagram;

at a minimum, the ISSO (or similar role within the organization)

Appropriate FedRAMP Security Controls Baseline (s) if Federal information is processed or stored within the external system

Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored

all external systems where Federal information is processed or stored

information processing, information or data, AND system services

development, implementation, AND operation

frequency at least annually

FedRAMP Security Authorization requirements

at least every 3 years

at least annually

significant changes

Protect against

at a minimum: ICMP (ping) flood, SYN flood, slowloris, buffer overflow attack, and volume attack

at least every 180 days or whenever there is a change in the threat environment that warrants a review of the exceptions

any systems

any network outside of organizational control and any network outside the authorization boundary

Host Intrusion Prevention System (HIPS), Host Intrusion Detection System (HIDS), or minimally a host-based firewall

confidentiality AND integrity

prevent unauthorized disclosure of information AND detect changes to information

no longer than ten (10) minutes for privileged sessions and no longer than fifteen (15) minutes for user sessions

In accordance with Federal requirements

FIPS-validated or NSA-approved cryptography

no exceptions for computing devices

confidentiality AND integrity

all information system components storing Federal data or system data that must be protected at the High or Moderate impact levels

At least hourly

http://tf.nist.gov/tf-cgi/servers.cgi

any difference

at least every 3 years

at least annually

significant changes

within thirty (30) days of release of updates

at least monthly

signature based and non-signature based

at least weekly

to include endpoints and network entry and exit points

to include blocking and quarantining malicious code

administrator or defined security personnel near-realtime

continuously

to include US-CERT and Cybersecurity and Infrastructure Security Agency (CISA) Directives

to include system security personnel and administrators with configuration/patch-management responsibilities

to include upon system startup and/or restart

at least monthly

to include system administrators and security personnel

selection to include security relevant event

at least monthly

to include the ISSO and/or similar role within the organization

to include chief privacy and ISSO and/or similar role or designees

at least every 3 years

at least annually

significant changes

at least annually

at least annually

notification of supply chain compromises and results of assessment or audits

all

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

AC-2 (3) Additional FedRAMP Requirements and Guidance

The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the JAB/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.

The service provider defines the time period of inactivity for device identifiers.

For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP https://public.cyber.mil/dccs/.

AC-2 (5) Additional FedRAMP Requirements and Guidance

Should use a shorter timeframe than AC-12.

AC-2 (9) Additional FedRAMP Requirements and Guidance

Required if shared/group accounts are deployed.

AC-2 (12) Additional FedRAMP Requirements and Guidance

Required for privileged accounts.

Required for privileged accounts.

AC-5 Additional FedRAMP Requirements and Guidance

CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.

AC-6 (2) Additional FedRAMP Requirements and Guidance

Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

AC-7 Additional FedRAMP Requirements and Guidance

In alignment with NIST SP 800-63B

AC-8 Additional FedRAMP Requirements and Guidance

The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.

If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

AC-20 Additional FedRAMP Requirements and Guidance

The interrelated controls of AC-20, CA-3, and SA-9 should be differentiated as follows:

AC-20 describes system access to and from external systems.

CA-3 describes documentation of an agreement between the respective system owners when data is exchanged between the CSO and an external system.

SA-9 describes the responsibilities of external system owners. These responsibilities would typically be captured in the agreement required by CA-3.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

AU-2 Additional FedRAMP Requirements and Guidance

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.

AU-3 (1) Additional FedRAMP Requirements and Guidance

For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.

AU-6 Additional FedRAMP Requirements and Guidance

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

AU-11 Additional FedRAMP Requirements and Guidance

The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

The service provider must support Agency requirements to comply with M-21-31 (https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf)

The service provider is encouraged to align with M-21-31 where possible

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

CA-2 Additional FedRAMP Requirements and Guidance

Reference FedRAMP Annual Assessment Guidance.

CA-2 (1) Additional FedRAMP Requirements and Guidance

For JAB Authorization, must use an accredited 3PAO.

CA-5 Additional FedRAMP Requirements and Guidance

POA&Ms must be provided at least monthly.

Reference FedRAMP-POAM-Template

CA-6 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F and according to FedRAMP Significant Change Policies and Procedures. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

CA-7 Additional FedRAMP Requirements and Guidance

Operating System, Database, Web Application, Container, and Service Configuration Scans: at least monthly. All scans performed by Independent Assessor: at least annually.

CSOs with more than one agency ATO must implement a collaborative Continuous Monitoring (Con Mon) approach described in the FedRAMP Guide for Multi-Agency Continuous Monitoring. This requirement applies to CSPs authorized via the Agency path as each agency customer is responsible for performing Con Mon oversight. It does not apply to CSPs authorized via the JAB path because the JAB performs Con Mon oversight.

FedRAMP does not provide a template for the Continuous Monitoring Plan. CSPs should reference the FedRAMP Continuous Monitoring Strategy Guide when developing the Continuous Monitoring Plan.

CA-8 Additional FedRAMP Requirements and Guidance

Reference the FedRAMP Penetration Test Guidance.

CA-8(2) Additional FedRAMP Requirements and Guidance

See the FedRAMP Documents page> Penetration Test Guidance

https://www.FedRAMP.gov/documents/

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

CM-2 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.

CM-3 Additional FedRAMP Requirements and Guidance

The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.

In accordance with record retention policies and procedures.

CM-6 Additional FedRAMP Requirements and Guidance

The service provider shall use the DoD STIGs to establish configuration settings; Center for Internet Security up to Level 2 (CIS Level 2) guidelines shall be used if STIGs are not available; Custom baselines shall be used if CIS is not available.

The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).

Compliance checks are used to evaluate configuration settings and provide general insight into the overall effectiveness of configuration management activities. CSPs and 3PAOs typically combine compliance check findings into a single CM-6 finding, which is acceptable. However, for initial assessments, annual assessments, and significant change requests, FedRAMP requires a clear understanding, on a per-control basis, where risks exist. Therefore, 3PAOs must also analyze compliance check findings as part of the controls assessment. Where a direct mapping exists, the 3PAO must document additional findings per control in the corresponding SAR Risk Exposure Table (RET), which are then documented in the CSP's Plan of Action and Milestones (POA&M). This will likely result in the details of individual control findings overlapping with those in the combined CM-6 finding, which is acceptable.

During monthly continuous monitoring, new findings from CSP compliance checks may be combined into a single CM-6 POA&M item. CSPs are not required to map the findings to specific controls because controls are only assessed during initial assessments, annual assessments, and significant change requests.

CM-7 Additional FedRAMP Requirements and Guidance

The service provider shall use Security guidelines (See CM-6) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if STIGs or CIS is not available.

CM-7 (2) Additional FedRAMP Requirements and Guidance

This control refers to software deployment by CSP personnel into the production environment. The control requires a policy that states conditions for deploying software. This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. allow-listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.

CM-8 Additional FedRAMP Requirements and Guidance

must be provided at least monthly or when there is a change.

FedRAMP does not provide a template for the Configuration Management Plan. However, NIST SP 800-128, Guide for Security-Focused Configuration Management of Information Systems, provides guidelines for the implementation of CM controls as well as a sample CMP outline in Appendix D of the Guide

CM-12 Additional FedRAMP Requirements and Guidance

According to FedRAMP Authorization Boundary Guidance

CM-12 (1) Additional FedRAMP Requirements and Guidance

According to FedRAMP Authorization Boundary Guidance.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

CP-2 Additional FedRAMP Requirements and Guidance

For JAB authorizations the contingency lists include designated FedRAMP personnel.

CSPs must use the FedRAMP Information System Contingency Plan (ISCP) Template (available on the fedramp.gov: https://www.fedramp.gov/assets/resources/templates/SSP-A06-FedRAMP-ISCP-Template.docx).

CP-3 Additional FedRAMP Requirements and Guidance

Privileged admins and engineers must take the basic contingency training within 10 days. Consideration must be given for those privileged admins and engineers with critical contingency-related roles, to gain enough system context and situational awareness to understand the full impact of contingency training as it applies to their respective level. Newly hired critical contingency personnel must take this more in-depth training within 60 days of hire date when the training will have more impact.

CP-4 Additional FedRAMP Requirements and Guidance

The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

The service provider must include the Contingency Plan test results with the security package within the Contingency Plan-designated appendix (Appendix G, Contingency Plan Test Report).

CP-7 Additional FedRAMP Requirements and Guidance

The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

CP-7 (1) Additional FedRAMP Requirements and Guidance

The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.

CP-8 Additional FedRAMP Requirements and Guidance

The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

CP-9 Additional FedRAMP Requirements and Guidance

The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.

The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.

The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.

CP-9 (8) Additional FedRAMP Requirements and Guidance

Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

IA-2 Additional FedRAMP Requirements and Guidance

For all control enhancements that specify multifactor authentication, the implementation must adhere to the Digital Identity Guidelines specified in NIST Special Publication 800-63B.

Multi-factor authentication must be phishing-resistant.

All uses of encrypted virtual private networks must meet all applicable Federal requirements and architecture, dataflow, and security and privacy controls must be documented, assessed, and authorized to operate.

"Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.

IA-2 (1) Additional FedRAMP Requirements and Guidance

According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).

Multi-factor authentication must be phishing-resistant.

Multi-factor authentication to subsequent components in the same user domain is not required.

IA-2 (2) Additional FedRAMP Requirements and Guidance

According to SP 800-63-3, SP 800-63A (IAL), SP 800-63B (AAL), and SP 800-63C (FAL).

Multi-factor authentication must be phishing-resistant.

Multi-factor authentication to subsequent components in the same user domain is not required.

IA-2 (6) Additional FedRAMP Requirements and Guidance

PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.

See SC-13 Guidance for more information on FIPS-validated or NSA-approved cryptography.

IA-2 (12) Additional FedRAMP Requirements and Guidance

Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

IA-5 Additional FedRAMP Requirements and Guidance

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3

SP 800-63C Section 6.2.3 Encrypted Assertion requires that authentication assertions be encrypted when passed through third parties, such as a browser. For example, a SAML assertion can be encrypted using XML-Encryption, or an OpenID Connect ID Token can be encrypted using JSON Web Encryption (JWE).

IA-5 (1) Additional FedRAMP Requirements and Guidance

Password policies must be compliant with NIST SP 800-63B for all memorized, lookup, out-of-band, or One-Time-Passwords (OTP). Password policies shall not enforce special character or minimum password rotation requirements for memorized secrets of users.

For cases where technology doesn't allow multi-factor authentication, these rules should be enforced: must have a minimum length of 14 characters and must support all printable ASCII characters.

For emergency use accounts, these rules should be enforced: must have a minimum length of 14 characters, must support all printable ASCII characters, and passwords must be changed if used.

Note that (c) and (d) require the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13).

IA-5 (7) Additional FedRAMP Requirements and Guidance

In this context, prohibited static storage refers to any storage where unencrypted authenticators, such as passwords, persist beyond the time required to complete the access process.

IA-11 Additional FedRAMP Requirements and Guidance

The fixed time period cannot exceed the limits set in SP 800-63. At this writing they are:

  • AAL2 (moderate baseline)
    • 12 hours or
    • 30 minutes of inactivity
IA-12 Additional FedRAMP Requirements and Guidance

In accordance with NIST SP 800-63A Enrollment and Identity Proofing

IA-12 (5) Additional FedRAMP Requirements and Guidance

In accordance with NIST SP 800-63A Enrollment and Identity Proofing

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

IR-3-2 Additional FedRAMP Requirements and Guidance

The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). Functional testing must occur prior to testing for initial authorization. Annual functional testing may be concurrent with required penetration tests (see CA-8). The service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test commencing.

IR-4 Additional FedRAMP Requirements and Guidance

The FISMA definition of "incident" shall be used: "An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies."

The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

IR-6 Additional FedRAMP Requirements and Guidance

Reports security incident information according to FedRAMP Incident Communications Procedure.

IR-8 Additional FedRAMP Requirements and Guidance

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

MA-5 (1) Additional FedRAMP Requirements and Guidance

Only MA-5 (1) (a) (1) is required by FedRAMP Moderate Baseline

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

MP-3 Additional FedRAMP Requirements and Guidance

Second parameter not-applicable

MP-4 Additional FedRAMP Requirements and Guidance

The service provider defines controlled areas within facilities where the information and information system reside.

MP-5 Additional FedRAMP Requirements and Guidance

The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

PE-14 Additional FedRAMP Requirements and Guidance

The service provider measures temperature at server inlets and humidity levels by dew point.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

PL-8 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.

PL-10 Additional FedRAMP Requirements and Guidance

Select the appropriate FedRAMP Baseline

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

RA-3 Additional FedRAMP Requirements and Guidance

Significant change is defined in NIST Special Publication 800-37 Revision 2, Appendix F.

Include all Authorizing Officials; for JAB authorizations to include FedRAMP.

RA-5 Additional FedRAMP Requirements and Guidance

See the FedRAMP Documents page> Vulnerability Scanning Requirements https://www.FedRAMP.gov/documents/

an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

If a vulnerability is listed among the CISA Known Exploited Vulnerability (KEV) Catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) the KEV remediation date supersedes the FedRAMP parameter requirement.

to include all Authorizing Officials; for JAB authorizations to include FedRAMP

Informational findings from a scanner are detailed as a returned result that holds no vulnerability risk or severity and for FedRAMP does not require an entry onto the POA&M or entry onto the RET during any assessment phase.

Warning findings, on the other hand, are given a risk rating (low, moderate, high or critical) by the scanning solution and should be treated like any other finding with a risk or severity rating for tracking purposes onto either the POA&M or RET depending on when the findings originated (during assessments or during monthly continuous monitoring). If a warning is received during scanning, but further validation turns up no actual issue then this item should be categorized as a false positive. If this situation presents itself during an assessment phase (initial assessment, annual assessment or any SCR), follow guidance on how to report false positives in the Security Assessment Report (SAR). If this situation happens during monthly continuous monitoring, a deviation request will need to be submitted per the FedRAMP Vulnerability Deviation Request Form.

Warnings are commonly associated with scanning solutions that also perform compliance scans, and if the scanner reports a "warning" as part of the compliance scanning of a CSO, follow guidance surrounding the tracking of compliance findings during either the assessment phases (initial assessment, annual assessment or any SCR) or monthly continuous monitoring as it applies. Guidance on compliance scan findings can be found by searching on "Tracking of Compliance Scans" in FAQs.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SA-4 Additional FedRAMP Requirements and Guidance

The service provider must comply with Federal Acquisition Regulation (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, which implements Section 889 (as well as any added updates related to FISMA to address security concerns in the system acquisitions process).

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.

See https://www.niap-ccevs.org/Product/index.cfm or https://www.commoncriteriaportal.org/products/.

SA-10 Additional FedRAMP Requirements and Guidance

track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.

SA-11(1) Additional FedRAMP Requirements

The service provider must document its methodology for reviewing newly developed code for the Service in its Continuous Monitoring Plan.

If Static code analysis cannot be performed (for example, when the source code is not available), then dynamic code analysis must be performed (see SA-11 (8))

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SC-7 Additional FedRAMP Requirements and Guidance

SC-7 (b) should be met by subnet isolation. A subnetwork (subnet) is a physically or logically segmented section of a larger network defined at TCP/IP Layer 3, to both minimize traffic and, important for a FedRAMP Authorization, add a crucial layer of network isolation. Subnets are distinct from VLANs (Layer 2), security groups, and VPCs and are specifically required to satisfy SC-7 part b and other controls. See the FedRAMP Subnets White Paper (https://www.fedramp.gov/assets/resources/documents/FedRAMP_subnets_white_paper.pdf) for additional information.

SC-7 (5) Additional FedRAMP Requirements and Guidance

For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing

SC-8 Additional FedRAMP Requirements and Guidance

For each instance of data in transit, confidentiality AND integrity should be through cryptography as specified in SC-8 (1), physical means as specified in SC-8 (5), or in combination.

For clarity, this control applies to all data in transit. Examples include the following data flows:

  • Crossing the system boundary
  • Between compute instances - including containers
  • From a compute instance to storage
  • Replication between availability zones
  • Transmission of backups to storage
  • From a load balancer to a compute instance
  • Flows from management tools required for their work - e.g. log collection, scanning, etc.

The following applies only when choosing SC-8 (5) in lieu of SC-8 (1).

FedRAMP-Defined Assignment / Selection Parameters

SC-8 (5)-1 [a hardened or alarmed carrier Protective Distribution System (PDS) when outside of Controlled Access Area (CAA)]

SC-8 (5)-2 [prevent unauthorized disclosure of information AND detect changes to information]

SC-8 (5) applies when physical protection has been selected as the method to protect confidentiality and integrity. For physical protection, data in transit must be in either a Controlled Access Area (CAA), or a Hardened or alarmed PDS.

Hardened or alarmed PDS: Shall be as defined in SECTION X - CATEGORY 2 PDS INSTALLATION GUIDANCE of CNSSI No.7003, titled PROTECTED DISTRIBUTION SYSTEMS (PDS). Per the CNSSI No. 7003 Section VIII, PDS must originate and terminate in a Controlled Access Area (CAA).

Controlled Access Area (CAA): Data will be considered physically protected, and in a CAA if it meets Section 2.3 of the DHS's Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. CSPs can meet Section 2.3 of the DHS' recommended practice by satisfactory implementation of the following controls PE-2 (1), PE-2 (2), PE-2 (3), PE-3 (2), PE-3 (3), PE-6 (2), and PE-6 (3).

Note: When selecting SC-8 (5), the above SC-8(5), and the above referenced PE controls must be added to the SSP.

CNSSI No.7003 can be accessed here:

https://www.dcsa.mil/Portals/91/documents/ctp/nao/CNSSI_7003_PDS_September_2015.pdf

DHS Recommended Practice: Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies can be accessed here:

https://us-cert.cisa.gov/sites/default/files/FactSheets/NCCIC%20ICS_FactSheet_Defense_in_Depth_Strategies_S508C.pdf

SC-8 (1) Additional FedRAMP Requirements and Guidance

Please ensure SSP Section 10.3 Cryptographic Modules Implemented for Data At Rest (DAR) and Data In Transit (DIT) is fully populated for reference in this control.

See M-22-09, including "Agencies encrypt all DNS requests and HTTP traffic within their environment"

SC-8 (1) applies when encryption has been selected as the method to protect confidentiality and integrity. Otherwise refer to SC-8 (5). SC-8 (1) is strongly encouraged.

Note that this enhancement requires the use of cryptography which must be compliant with Federal requirements and utilize FIPS validated or NSA approved cryptography (see SC-13.)

When leveraging encryption from the underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.

SC-12 Additional FedRAMP Requirements and Guidance

See references in NIST 800-53 documentation.

Must meet applicable Federal Cryptographic Requirements. See References Section of control.

Wildcard certificates may be used internally within the system, but are not permitted for external customer access to the system.

SC-13 Additional FedRAMP Requirements and Guidance

This control applies to all use of cryptography. In addition to encryption, this includes functions such as hashing, random number generation, and key generation. Examples include the following:

  • Encryption of data
  • Decryption of data
  • Generation of one time passwords (OTPs) for MFA
  • Protocols such as TLS, SSH, and HTTPS

The requirement for FIPS 140 validation, as well as timelines for acceptance of FIPS 140-2, and 140-3 can be found at the NIST Cryptographic Module Validation Program (CMVP).

https://csrc.nist.gov/projects/cryptographic-module-validation-program

For NSA-approved cryptography, the National Information Assurance Partnership (NIAP) oversees a national program to evaluate Commercial IT Products for Use in National Security Systems. The NIAP Product Compliant List can be found at the following location:

https://www.niap-ccevs.org/Product/index.cfm

When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.

Moving to non-FIPS CM or product is acceptable when:

  • FIPS validated version has a known vulnerability
  • Feature with vulnerability is in use
  • Non-FIPS version fixes the vulnerability
  • Non-FIPS version is submitted to NIST for FIPS validation
  • POA&M is added to track approval, and deployment when ready

At a minimum, this control applies to cryptography in use for the following controls: AU-9(3), CP-9(8), IA-2(6), IA-5(1), MP-5, SC-8(1), and SC-28(1).

SC-15 Additional FedRAMP Requirements and Guidance

The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

SC-20 Additional FedRAMP Requirements and Guidance

Control Description should include how DNSSEC is implemented on authoritative DNS servers to supply valid responses to external DNSSEC requests.

SC-20 applies to use of external authoritative DNS to access a CSO from outside the boundary.

External authoritative DNS servers may be located outside an authorized environment. Positioning these servers inside an authorized boundary is encouraged.

CSPs are recommended to self-check DNSSEC configuration through one of many available analyzers such as Sandia National Labs (https://dnsviz.net)

SC-21 Additional FedRAMP Requirements and Guidance

Control description should include how DNSSEC is implemented on recursive DNS servers to make DNSSEC requests when resolving DNS requests from internal components to domains external to the CSO boundary.

  • If the reply is signed, and fails DNSSEC, do not use the reply
  • If the reply is unsigned:
    • CSP chooses the policy to apply

Internal recursive DNS servers must be located inside an authorized environment. It is typically within the boundary, or leveraged from an underlying IaaS/PaaS.

Accepting an unsigned reply is acceptable

SC-21 applies to use of internal recursive DNS to access a domain outside the boundary by a component inside the boundary.

  • DNSSEC resolution to access a component inside the boundary is excluded.
SC-28 Additional FedRAMP Requirements and Guidance

The organization supports the capability to use cryptographic mechanisms to protect information at rest.

When leveraging encryption from underlying IaaS/PaaS: While some IaaS/PaaS services provide encryption by default, many require encryption to be configured, and enabled by the customer. The CSP has the responsibility to verify encryption is properly configured.

Note that this enhancement requires the use of cryptography in accordance with SC-13.

SC-28 (1) Additional FedRAMP Requirements and Guidance

Organizations should select a mode of protection that is targeted towards the relevant threat scenarios.

Examples:

A. Organizations may apply full disk encryption (FDE) to a mobile device where the primary threat is loss of the device while storage is locked.

B. For a database application housing data for a single customer, encryption at the file system level would often provide more protection than FDE against the more likely threat of an intruder on the operating system accessing the storage.

C. For a database application housing data for multiple customers, encryption with unique keys for each customer at the database record level may be more appropriate.

SC-45(1) Additional FedRAMP Requirements and Guidance

The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.

The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.

Synchronization of system clocks improves the accuracy of log analysis.

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SI-4 Additional FedRAMP Requirements and Guidance

See US-CERT Incident Response Reporting Guidelines.

SI-4 (5) Additional FedRAMP Requirements and Guidance

In accordance with the incident response plan.

SI-5 Additional FedRAMP Requirements and Guidance

Service Providers must address the CISA Emergency and Binding Operational Directives applicable to their cloud service offering per FedRAMP guidance. This includes listing the applicable directives and stating compliance status.

SI-8 Additional FedRAMP Requirements and Guidance

When CSO sends email on behalf of the government as part of the business offering, Control Description should include implementation of Domain-based Message Authentication, Reporting & Conformance (DMARC) on the sending domain for outgoing messages as described in DHS Binding Operational Directive (BOD) 18-01.

https://cyber.dhs.gov/bod/18-01/

CSPs should confirm DMARC configuration (where appropriate) to ensure that policy=reject and the rua parameter includes reports@dmarc.cyber.dhs.gov. DMARC compliance should be documented in the SI-08 control implementation solution description, and list the FROM: domain(s) that will be seen by email recipients.

SI-10 Additional FedRAMP Requirements and Guidance

Validate all information inputs and document any exceptions

This response must address all control sub-statement requirements.

This response must address all control sub-statement requirements.

SR-3 Additional FedRAMP Requirements and Guidance

CSO must document and maintain the supply chain custody, including replacement devices, to ensure the integrity of the devices before being introduced to the boundary.

SR-6 Additional FedRAMP Requirements and Guidance

CSOs must ensure that their supply chain vendors build and test their systems in alignment with NIST SP 800-171 or a commensurate security and compliance framework. CSOs must ensure that vendors are compliant with physical facility access and logical access controls to supplied products.

SR-8 Additional FedRAMP Requirements and Guidance

CSOs must ensure and document how they receive notifications from their supply chain vendor of newly discovered vulnerabilities including zero-day vulnerabilities.

SR-11 Additional FedRAMP Requirements and Guidance

CSOs must ensure that their supply chain vendors provide authenticity of software and patches and the vendor must have a plan to protect the development pipeline.

FedRAMP Applicable Laws and Regulations

FedRAMP Logo

NIST Special Publication (SP) 800-53 revision 5